Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem

被引:0
|
作者
Bouillaguet, Charles [1 ]
Faugere, Jean-Charles
Fouque, Pierre-Alain [1 ]
Perret, Ludovic
机构
[1] Ecole Normale Super, F-75231 Paris, France
来源
关键词
GROBNER BASES; SQUARE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a practical cryptanalysis of the Identification Scheme proposed by Patarin at Crypto 1996. This scheme relies on the hardness of the Isomorphism of Polynomial with One Secret (IP1S), and enjoys shorter key than many other schemes based on the hardness of a combinatorial problem (as opposed to number-theoretic problems). Patarin proposed concrete parameters that have not been broken faster than exhaustive search so far. On the theoretical side, IP1S has been shown to be harder than Graph Isomorphism, which makes it an interesting target. We present two new deterministic algorithms to attack the IP1S problem, and we rigorously analyze their complexity and success probability. We show that they can solve a (big) constant fraction of all the instances of degree two in polynomial time. We verified that our algorithms are very efficient in practice. All the parameters with degree two proposed by Patarin are now broken in a few seconds. The parameters with degree three can be broken in less than a CPU-month. The identification scheme is thus quite badly broken.
引用
收藏
页码:473 / 493
页数:21
相关论文
共 50 条
  • [41] One polynomials secret sharing scheme based on the elliptic curve
    Yin Xinchun
    Wang Caimei
    Wang Yuanyuan
    2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 386 - 389
  • [42] Cryptanalysis of a One-Time Code-Based Digital Signature Scheme
    Santini, Paolo
    Baldi, Marco
    Chiaraluce, Franco
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2594 - 2598
  • [43] A public key encryption scheme based on the polynomial reconstruction problem
    Augot, D
    Finiasz, M
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 229 - 240
  • [44] A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
    Fulin Li
    Yang Liu
    Jiayun Yan
    Shixin Zhu
    Cryptography and Communications, 2022, 14 : 1039 - 1053
  • [45] Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers
    Liu, Lintao
    Lu, Yuliang
    Yan, Xuehu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) : 1265 - 1287
  • [46] A Lossless Polynomial-Based Secret Image Sharing Scheme Utilizing the Filtering Operation
    Liu, Lintao
    Lu, Yuliang
    Yan, Xuehu
    Ding, Wanmeng
    Xuan, Qitian
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 129 - 139
  • [47] Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers
    Lintao Liu
    Yuliang Lu
    Xuehu Yan
    Multimedia Tools and Applications, 2019, 78 : 1265 - 1287
  • [48] Two-Qubit Quantum Secret Sharing Scheme based on Symmetric Bivariate Polynomial
    Kumar, Manoj
    Hardeep
    Gupta, Pratik
    IAENG International Journal of Applied Mathematics, 2024, 54 (11) : 2470 - 2476
  • [49] Participants Increasing for Shamir's Polynomial-based Secret Image Sharing Scheme
    Ding, Wanmeng
    Liu, Kesheng
    Liu, Lintao
    Yan, Xuehu
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 32 - 36
  • [50] A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial
    Li, Fulin
    Liu, Yang
    Yan, Jiayun
    Zhu, Shixin
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2022, 14 (05): : 1039 - 1053